Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

May 2024

What Is APP Fraud, and 6 Steps to Prevent It

Imagine your finance team receives an urgent email that appears to be from a trusted supplier, notifying them of an unexpected change in bank account details for an upcoming payment. The email looks professional, is detailed, and contains all the expected business formalities. Without hesitation, the team processes the payment to the new account. Days later, the actual supplier contacts you about the overdue invoice.

What Is SEO Poisoning? 5 Signs You Could Be Impacted

Search engines are the Internet’s gateway, reliably guiding us to the information we seek. However, cybercriminals are increasingly exploiting this trust by using sophisticated techniques to manipulate search engine results to drive traffic to malicious websites by getting them ranked higher than real sites. This practice, known as SEO poisoning, poses a significant threat to individuals and businesses. In a notable example, a 2022 campaign saw 15,000 sites hacked in a Google SEO poisoning attack.

Memcyco Presents: The State of Digital Impersonation Fraud Resilience

Ever had those sleepless nights, tossing and turning, worrying about your next health checkup? Well, in the cyber world, it’s your brand that’s losing sleep! We recently talked to 200 top-notch security and fraud professionals—think of them as the cardiologists of the cybersecurity world. They spilled the beans on how digital impersonation attacks mess with their brand’s health.

How Can AI Be Used to Combat Phishing Attacks

Phishing is not going away—it’s morphing and evolving. As an example, in late 2022 the overnight commodification of artificial intelligence (AI) changed the phishing threat landscape forever, lowering the barrier to entry for novice fraudsters who had previously had the motives, but lacked the means to launch sophisticated scams. ChatGPT and fraud-specific Generative AI tools (like the aptly named FraudGPT and WormGPT) granted malefactors the ability to supercharge and scale their operations.

Top 10 Data Governance Tools for 2024

A single misstep in managing sensitive data can lead to a data breach causing significant financial losses and severe damage to a company’s reputation. These breaches often expose sensitive customer and corporate data, underscoring the need for robust cybersecurity measures. Unfortunately, many organizations have an inadequate approach to data governance.

User Access Review Template (with download)

“Your entire company network was compromised, all through a single login.” That’s the reality of an employee single sign-on (SSO) breach nightmare. Hackers create fake SSO login pages in order to steal employee credentials, which can literally give them “the keys to the kingdom” – access to the most sensitive data of the organization. From a disgruntled ex-employee to a compromised user, it can become a devastating security hole. It happens more than you think.

Top 11 Digital Asset Protection Methods for 2024

In a world that’s gone digital, it’s no surprise that so have our assets. Protecting digital assets is crucial to maintaining an organization’s operations and revenues, whether it’s sensitive personal identifiable information (PII), business data, or intellectual property. Online threats rapidly evolve to employ complex counterfeiting and spoofing of digital assets and new means to break down the software gates they hide behind.

What is Fraud Monitoring, and 5 Ways to Tell if You Need It

Best-selling writer Maria Konnikova once wrote, “Fraud thrives in moments of great social change and transition.” These words ring truer than ever as additional aspects of business and everyday life move swiftly online. Whether you think about eCommerce, remote work, online banking, or digital government services, the opportunities for fraudsters continue to multiply. The online world currently creates such a fertile ground for fraudulent activity that U.S.